Seguir
Younho Lee
Younho Lee
Professor, IT Management Division, Department of Data Science, SeoulTech
Dirección de correo verificada de seoultech.ac.kr - Página principal
Título
Citado por
Citado por
Año
Order-preserving symmetric encryption
A Boldyreva, N Chenette, Y Lee, A O’neill
Advances in Cryptology-EUROCRYPT 2009, 224-241, 2009
12862009
Over 100x faster bootstrapping in fully homomorphic encryption through memory-centric optimization with GPUs
W Jung, S Kim, JH Ahn, JH Cheon, Y Lee
IACR Transactions on Cryptographic Hardware and Embedded Systems, 114-148, 2021
1082021
Trust evaluation model for wireless sensor networks
J Hur, Y Lee, H Yoon, D Choi, S Jin
Advanced Communication Technology, 2005, ICACT 2005. The 7th International …, 2005
1032005
A new data hiding scheme for binary image authentication with small image distortion
Y Lee, H Kim, Y Park
Information Sciences 179 (22), 3866-3884, 2009
662009
Real-time analysis of intrusion detection alerts via correlation
S Lee, B Chung, H Kim, Y Lee, C Park, H Yoon
Computers & Security 25 (3), 169-183, 2006
622006
Trust management for resilient wireless sensor networks
J Hur, Y Lee, SM Hong, H Yoon
Information Security and Cryptology-ICISC 2005, 56-68, 2005
422005
Efficient machine learning over encrypted data with non-interactive communication
H Park, P Kim, H Kim, KW Park, Y Lee
Computer Standards & Interfaces 58, 87-108, 2018
312018
Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field.
J Lee, H Kim, Y Lee, SM Hong, H Yoon
IJ Network Security 4 (1), 99-106, 2007
302007
RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices
J Lee, D Kim, H Lee, Y Lee, JH Cheon
IEEE Access 7, 2080-2091, 2019
292019
Improved multi-precision squaring for low-end RISC microcontrollers
Y Lee, IH Kim, Y Park
Journal of Systems and Software 86 (1), 60-71, 2013
292013
On-demand secure routing protocol for ad hoc network using id based cryptosystem
YH Lee, H Kim, B Chung, J Lee, H Yoon
Parallel and Distributed Computing, Applications and Technologies, 2003 …, 2003
252003
A robust and flexible digital rights management system for home networks
H Kim, Y Lee, Y Park
Journal of Systems and Software 83 (12), 2431-2440, 2010
222010
Digital rights management with right delegation for home networks
H Kim, Y Lee, B Chung, H Yoon, J Lee, KI Jung
Information Security and Cryptology–ICISC 2006, 233-245, 2006
222006
Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay
D Choi, Y Lee
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
212016
Efficient Sorting of Homomorphic Encrypted Data With k-Way Sorting Network
S Hong, S Kim, J Choi, Y Lee, JH Cheon
IEEE Transactions on Information Forensics and Security 16, 4389-4404, 2021
192021
A new binary image authentication scheme with small distortion and low false negative rates
LEE Younho, HUR Junbeom, KIM Heeyoul, P Yongsu
IEICE transactions on communications 90 (11), 3259-3262, 2007
192007
Secure Ordered Bucketization
Y Lee
IEEE Transactions on Dependable and Secure Computing 11 (3), 292-303, 2014
182014
Personalized EigenTrust with the Beta Distribution.
D Choi, S Jin, Y Lee, Y Park
ETRI journal 32 (2), 2010
182010
Eavesdropping of Magnetic Secure Transmission Signals and Its Security Implications for a Mobile Payment Protocol
D Choi, Y Lee
IEEE Access 6, 42687-42701, 2018
162018
Privacy-Preserving Deep Sequential Model with Matrix Homomorphic Encryption
J Jang, Y Lee, A Kim, B Na, D Yhee, B Lee, JH Cheon, S Yoon
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
152022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20